Search

Piotr Poltorak

Examiner (ID: 10310)

Most Active Art Unit
2433
Art Unit(s)
2134, 2434, 2496, 2433
Total Applications
845
Issued Applications
607
Pending Applications
51
Abandoned Applications
200

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 6204314 [patent_doc_number] => 20110067100 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-17 [patent_title] => 'JOB PROCESSING SYSTEM AND IMAGE PROCESSING APPARATUS' [patent_app_type] => utility [patent_app_number] => 12/880214 [patent_app_country] => US [patent_app_date] => 2010-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 15764 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0067/20110067100.pdf [firstpage_image] =>[orig_patent_app_number] => 12880214 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/880214
Job processing system and image processing apparatus Sep 12, 2010 Issued
Array ( [id] => 8924208 [patent_doc_number] => 08490158 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-16 [patent_title] => 'Firewall including local bus' [patent_app_type] => utility [patent_app_number] => 12/837271 [patent_app_country] => US [patent_app_date] => 2010-07-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6916 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 160 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12837271 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/837271
Firewall including local bus Jul 14, 2010 Issued
Array ( [id] => 7671551 [patent_doc_number] => 20110320820 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-12-29 [patent_title] => 'Restoring Secure Sessions' [patent_app_type] => utility [patent_app_number] => 12/821355 [patent_app_country] => US [patent_app_date] => 2010-06-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10187 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12821355 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/821355
Restoring secure sessions Jun 22, 2010 Issued
Array ( [id] => 5977447 [patent_doc_number] => 20110154489 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-06-23 [patent_title] => 'SYSTEM FOR ANALYZING MALICIOUS BOTNET ACTIVITY IN REAL TIME' [patent_app_type] => utility [patent_app_number] => 12/821576 [patent_app_country] => US [patent_app_date] => 2010-06-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6128 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0154/20110154489.pdf [firstpage_image] =>[orig_patent_app_number] => 12821576 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/821576
SYSTEM FOR ANALYZING MALICIOUS BOTNET ACTIVITY IN REAL TIME Jun 22, 2010 Abandoned
Array ( [id] => 7671540 [patent_doc_number] => 20110320809 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-12-29 [patent_title] => 'METHOD AND APPARATUS FOR KEY REVOCATION IN AN ATTRIBUTE-BASED ENCRYPTION SCHEME' [patent_app_type] => utility [patent_app_number] => 12/821528 [patent_app_country] => US [patent_app_date] => 2010-06-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5116 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12821528 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/821528
Method and apparatus for key revocation in an attribute-based encryption scheme Jun 22, 2010 Issued
Array ( [id] => 5977450 [patent_doc_number] => 20110154492 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-06-23 [patent_title] => 'MALICIOUS TRAFFIC ISOLATION SYSTEM AND METHOD USING BOTNET INFORMATION' [patent_app_type] => utility [patent_app_number] => 12/821549 [patent_app_country] => US [patent_app_date] => 2010-06-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 29 [patent_figures_cnt] => 29 [patent_no_of_words] => 7753 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0154/20110154492.pdf [firstpage_image] =>[orig_patent_app_number] => 12821549 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/821549
MALICIOUS TRAFFIC ISOLATION SYSTEM AND METHOD USING BOTNET INFORMATION Jun 22, 2010 Abandoned
Array ( [id] => 6281941 [patent_doc_number] => 20100257586 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-10-07 [patent_title] => 'Projector projecting password' [patent_app_type] => utility [patent_app_number] => 12/801623 [patent_app_country] => US [patent_app_date] => 2010-06-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3144 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0257/20100257586.pdf [firstpage_image] =>[orig_patent_app_number] => 12801623 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/801623
Projector projecting password Jun 16, 2010 Issued
Array ( [id] => 6585298 [patent_doc_number] => 20100235644 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-09-16 [patent_title] => 'Method and System for a Recursive Security Protocol for Digital Copyright Control' [patent_app_type] => utility [patent_app_number] => 12/788516 [patent_app_country] => US [patent_app_date] => 2010-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 17970 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0235/20100235644.pdf [firstpage_image] =>[orig_patent_app_number] => 12788516 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/788516
Method and system for a recursive security protocol for digital copyright control May 26, 2010 Issued
Array ( [id] => 8308687 [patent_doc_number] => 08230236 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-07-24 [patent_title] => 'Secure digital content distribution system and secure hard drive' [patent_app_type] => utility [patent_app_number] => 12/685344 [patent_app_country] => US [patent_app_date] => 2010-01-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 10 [patent_no_of_words] => 3883 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 124 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12685344 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/685344
Secure digital content distribution system and secure hard drive Jan 10, 2010 Issued
Array ( [id] => 7684053 [patent_doc_number] => 20100122088 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-05-13 [patent_title] => 'METHOD AND SYSTEM FOR CONTROL OF CODE EXECUTION ON A GENERAL PURPOSE COMPUTING DEVICE AND CONTROL OF CODE EXECUTION IN A RECURSIVE SECURITY PROTOCOL' [patent_app_type] => utility [patent_app_number] => 12/615843 [patent_app_country] => US [patent_app_date] => 2009-11-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 22839 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0122/20100122088.pdf [firstpage_image] =>[orig_patent_app_number] => 12615843 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/615843
Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol Nov 9, 2009 Issued
Array ( [id] => 6649378 [patent_doc_number] => 20100037294 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-02-11 [patent_title] => 'METHOD AND APPARATUS FOR PROVIDING A HIERARCHICHAL SECURITY PROFILE OBJECT' [patent_app_type] => utility [patent_app_number] => 12/603323 [patent_app_country] => US [patent_app_date] => 2009-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4188 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0037/20100037294.pdf [firstpage_image] =>[orig_patent_app_number] => 12603323 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/603323
METHOD AND APPARATUS FOR PROVIDING A HIERARCHICHAL SECURITY PROFILE OBJECT Oct 20, 2009 Abandoned
Array ( [id] => 6511385 [patent_doc_number] => 20100095134 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-15 [patent_title] => 'PROGRAMMING NON-VOLATILE MEMORY IN A SECURE PROCESSOR' [patent_app_type] => utility [patent_app_number] => 12/576904 [patent_app_country] => US [patent_app_date] => 2009-10-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5785 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0095/20100095134.pdf [firstpage_image] =>[orig_patent_app_number] => 12576904 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/576904
Programming non-volatile memory in a secure processor Oct 8, 2009 Issued
Array ( [id] => 6511290 [patent_doc_number] => 20100095125 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-15 [patent_title] => 'CERTIFICATE VERIFICATION' [patent_app_type] => utility [patent_app_number] => 12/576344 [patent_app_country] => US [patent_app_date] => 2009-10-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5813 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0095/20100095125.pdf [firstpage_image] =>[orig_patent_app_number] => 12576344 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/576344
Certificate verification Oct 8, 2009 Issued
Array ( [id] => 9781292 [patent_doc_number] => 08856513 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-10-07 [patent_title] => 'Programming on-chip non-volatile memory in a secure processor using a sequence number' [patent_app_type] => utility [patent_app_number] => 12/576356 [patent_app_country] => US [patent_app_date] => 2009-10-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5801 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 185 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12576356 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/576356
Programming on-chip non-volatile memory in a secure processor using a sequence number Oct 8, 2009 Issued
Array ( [id] => 6630994 [patent_doc_number] => 20100100930 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-22 [patent_title] => 'HOSTED VULNERABILITY MANAGEMENT FOR WIRELESS DEVICES' [patent_app_type] => utility [patent_app_number] => 12/574701 [patent_app_country] => US [patent_app_date] => 2009-10-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 37 [patent_figures_cnt] => 37 [patent_no_of_words] => 24952 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0100/20100100930.pdf [firstpage_image] =>[orig_patent_app_number] => 12574701 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/574701
HOSTED VULNERABILITY MANAGEMENT FOR WIRELESS DEVICES Oct 6, 2009 Abandoned
Array ( [id] => 9999260 [patent_doc_number] => 09043877 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-05-26 [patent_title] => 'Temporarily providing higher privileges for computing system to user identifier' [patent_app_type] => utility [patent_app_number] => 12/574562 [patent_app_country] => US [patent_app_date] => 2009-10-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5502 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 240 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12574562 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/574562
Temporarily providing higher privileges for computing system to user identifier Oct 5, 2009 Issued
Array ( [id] => 6031647 [patent_doc_number] => 20110055580 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-03 [patent_title] => 'NONCE GENERATION' [patent_app_type] => utility [patent_app_number] => 12/574090 [patent_app_country] => US [patent_app_date] => 2009-10-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 16018 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0055/20110055580.pdf [firstpage_image] =>[orig_patent_app_number] => 12574090 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/574090
Nonce generation Oct 5, 2009 Issued
Array ( [id] => 10854521 [patent_doc_number] => 08881234 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-11-04 [patent_title] => 'Host state monitoring' [patent_app_type] => utility [patent_app_number] => 12/574120 [patent_app_country] => US [patent_app_date] => 2009-10-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 14 [patent_no_of_words] => 16018 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 323 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12574120 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/574120
Host state monitoring Oct 5, 2009 Issued
Array ( [id] => 6035998 [patent_doc_number] => 20110083015 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-04-07 [patent_title] => 'SYSTEM AND METHOD FOR AN ELECTRONIC SIGNATURE FOR QUICK AND EFFICIENT DATA AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 12/573596 [patent_app_country] => US [patent_app_date] => 2009-10-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8302 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0083/20110083015.pdf [firstpage_image] =>[orig_patent_app_number] => 12573596 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/573596
SYSTEM AND METHOD FOR AN ELECTRONIC SIGNATURE FOR QUICK AND EFFICIENT DATA AUTHENTICATION Oct 4, 2009 Abandoned
Array ( [id] => 6631045 [patent_doc_number] => 20100100936 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-22 [patent_title] => 'Secure Wireless Network Using Radiometric Signatures' [patent_app_type] => utility [patent_app_number] => 12/555369 [patent_app_country] => US [patent_app_date] => 2009-09-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7359 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0100/20100100936.pdf [firstpage_image] =>[orig_patent_app_number] => 12555369 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/555369
Secure Wireless Network Using Radiometric Signatures Sep 7, 2009 Abandoned
Menu